How one product manager builds community at Microsoft Security

Credit to Author: Christine Barrett| Date: Thu, 29 Sep 2022 17:00:00 +0000

In this interview, Principal Product Manager Joey Cruz explains how his military experience inspires his work protecting customers in identity and access management at Microsoft.

The post How one product manager builds community at Microsoft Security appeared first on Microsoft Security Blog.

Read more

CSO perspective: Why a strong IAM strategy is key to an organization’s cybersecurity approach

Credit to Author: Christine Barrett| Date: Thu, 29 Sep 2022 16:00:00 +0000

Mastercard Deputy Chief Security Officer Alissa “Dr. Jay” Abdullah, Ph.D., shares insights on why identity and access management is necessary and strategies for securing identities.

The post CSO perspective: Why a strong IAM strategy is key to an organization’s cybersecurity approach appeared first on Microsoft Security Blog.

Read more

ZINC weaponizing open-source software

Credit to Author: Katie McCafferty| Date: Thu, 29 Sep 2022 16:00:00 +0000

In recent months, Microsoft detected weaponization of legitimate open-source software by an actor the Microsoft Threat Intelligence Center (MSTIC) tracks as ZINC, targeting employees at media, defense and aerospace, and IT service provider organizations in the US, UK, India, and Russia.

The post ZINC weaponizing open-source software appeared first on Microsoft Security Blog.

Read more

Malicious OAuth applications abuse cloud email services to spread spam

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Thu, 22 Sep 2022 16:00:00 +0000

Microsoft discovered an attack where attackers installed a malicious OAuth application in compromised tenants and used their Exchange Online service to launch spam runs.

The post Malicious OAuth applications abuse cloud email services to spread spam appeared first on Microsoft Security Blog.

Read more

Malicious OAuth applications used to compromise email servers and spread spam

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Thu, 22 Sep 2022 16:00:00 +0000

Microsoft discovered an attack where attackers installed a malicious OAuth application in compromised tenants and used their Exchange servers to launch spam runs.

The post Malicious OAuth applications used to compromise email servers and spread spam appeared first on Microsoft Security Blog.

Read more

Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 21 Sep 2022 17:00:00 +0000

A fake mobile banking rewards app delivered through a link in an SMS campaign has been making the rounds, targeting customers of Indian banking institutions. Users who install the mobile app are unknowingly installing an Android malware with remote access trojan (RAT) capabilities.

The post Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices appeared first on Microsoft Security Blog.

Read more

The art and science behind Microsoft threat hunting: Part 2

Credit to Author: Matt Thomas| Date: Wed, 21 Sep 2022 16:00:00 +0000

In this follow-up post in our series about threat hunting, we talk about some general hunting strategies, frameworks, tools, and how Microsoft incident responders work with threat intelligence.

The post The art and science behind Microsoft threat hunting: Part 2 appeared first on Microsoft Security Blog.

Read more

New Windows 11 security features are designed for hybrid work

Credit to Author: Christine Barrett| Date: Tue, 20 Sep 2022 17:00:00 +0000

With Windows 11, you can protect your valuable data and enable secure hybrid work with the latest advanced security. We’re proud to announce the new security features you heard about this spring are now available.

The post New Windows 11 security features are designed for hybrid work appeared first on Microsoft Security Blog.

Read more